Вы находитесь на странице: 1из 2

1.

Producing, using, trafficking in one or more counterfeit access devices;


Examples;
-a person designing a counterfeit credit card.

-using a counterfeit credit card to buy stuffs for your own gain.

2. Using an access device fraudulently applied for;


Examples;

-stealing another person’s credit card and using it to purchase gift cards to use and transfer to cash.
-snatching an unaware person’s cellular device and using it to ask for money to not let all the content
of the phone to spread.

3. inducing, enticing, permitting or in any manner allowing another, for consideration or otherwise to
produce, use, traffic in counterfeit access devices, unauthorized access devices or access devices
fraudulently applied for;
Examples;
-asking for tech-support to a site to a supposed to be person to help you fix your PC through giving
them access to your PC yet it turns out he/she puts a virus in your PC and asks for money to fix
what they did to your PC.
- using of smartphones to text and deceive people on clicking the said message saying a family
member of them is at grave danger giving them access to their SIM card to send a load.

4. Using, with intent to defraud, an unauthorized access device


Examples;
-asking your friend to lend his/her mobile device just to play games but, you use it to transfer load to
your own mobile device instead without his/her permission.

-using your mom’s debit card secretly to purchase gaming items.

5. obtaining money or anything of value through the use of an access device, with intent to defraud
or with intent to gain and fleeing thereafter;
-using the internet to deceive people through a sad story and you need to click something to donate
and after donating you’ll never hear from him/her again.

-having people donate money to your account because you said that their money will be doubled in
a month.
.

Вам также может понравиться